Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Endpoint Security Suite Enterprise Advanced Installation Guide v3.8

Full Disk Encryption

  • This section details all Dell ProSupport approved registry settings for local computers, regardless of the reason for the registry setting. If a registry setting overlaps two products, it is listed in each category.
  • These registry changes should be done by administrators only and may not be appropriate or function in all scenarios.
  • To set the retry interval when the Dell Server is unavailable to communicate with Full Disk Encryption, add the following registry value.

    [HKLM\System\CurrentControlSet\Services\DellMgmtAgent\Parameters]

    "CommErrorSleepSecs"=DWORD:300

    This value is the number of seconds Full Disk Encryption waits to attempt to contact the Dell Server if it is unavailable to communicate with Full Disk Encryption. The default is 300 seconds (5 minutes).

  • If a self-signed certificate is used on the Dell Server for Full Disk Encryption, SSL/TLS trust validation must remain disabled on the client computer (SSL/TLS trust validation is disabled by default with Full Disk Encryption). Before enabling SSL/TLS trust validation on the client computer, the following requirements must be met.

    • A certificate signed by a root authority, such as EnTrust or Verisign, must be imported into Dell Server.
    • The full chain of trust of the certificate must be stored in the Microsoft keystore on the client computer.
    • To enable SSL/TLS trust validation for Dell Encryption management, change the value of the following registry entry to 0 on the client computer.

      [HKLM\System\CurrentControlSet\Services\DellMgmtAgent\Parameters]

      "DisableSSLCertTrust"=DWORD:0

      0 = Enabled

      1 = Disabled

  • To determine if the PBA is activated, ensure that the following value is set:

    [HKLM\SYSTEM\CurrentControlSet\services\DellMgmtAgent\Parameters]

    "PBAIsActivated"=DWORD (32-bit):1

    A value of 1 means that the PBA is activated. A value of 0 means the PBA is not activated.

    NOTE:Manually deleting this key can create unintended results for users syncing with the PBA resulting in the need for manual recovery.
  • To determine if a smart card is present and active, ensure the following value is set:

    HKLM\SOFTWARE\Dell\Dell Data Protection\

    "SmartcardEnabled"=DWORD:1

    If SmartcardEnabled is missing or has a value of zero, the Credential Provider will display only Password for authentication.

    If SmartcardEnabled has a non-zero value, the Credential Provider will display options for Password and smart card authentication.

  • The following registry value indicates whether Winlogon should generate a notification for logon events from smart cards.

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify

    "SmartCardLogonNotify"=DWORD:1

    0 = Disabled

    1 = Enabled

  • The Security Server host may be changed from the original installation location if needed. The host information is read by the client computer every time a policy poll occurs. Change the following registry value on the client computer:

    [HKLM\SYSTEM\CurrentControlSet\services\DellMgmtAgent]

    "ServerHost"=REG_SZ:<newname>.<organization>.com

  • The Security Server port may be changed from the original installation location if needed. This value is read by the client computer every time a policy poll occurs. Change the following registry value on the client computer:

    [HKLM\SYSTEM\CurrentControlSet\services\DellMgmtAgent]

    ServerPort=REG_SZ:8888

  • (With pre-boot authentication only) If you do not want PBA advanced authentication to change the services associated with smart cards and biometric devices to a startup type of "automatic", disable the service startup feature. Disabling this feature also suppresses warnings associated with the required services not running.

    When disabled, PBA advanced authentication does not attempt to start these services:

    • SCardSvr - Manages access to smart cards read by the computer. If this service is stopped, this computer is unable to read smart cards. If this service is disabled, any services that explicitly depend on it fail to start.
    • SCPolicySvc - Allows the system to be configured to lock the user desktop upon smart card removal.
    • WbioSrvc - The Windows biometric service gives client applications the ability to capture, compare, manipulate, and store biometric data without gaining direct access to any biometric hardware or samples. The service is hosted in a privileged SVCHOST process.

      By default, if the registry key does not exist or the value is set to 0, this feature is enabled.

      [HKLM\SOFTWARE\DELL\Dell Data Protection]

      SmartCardServiceCheck=REG_DWORD:0

      0 = Enabled

      1 = Disabled

  • To prevent Full Disk Encryption from disabling third-party credential providers, create the following registry key:

    HKLM\SOFTWARE\Dell\Dell Data Protection\

    "AllowOtherCredProviders" = DWORD:1

    0=Disabled (default)

    1=Enabled

    NOTE: This value may prevent the Dell credential provider from properly syncing credentials initially due to third-party credential providers being disabled. Ensure the devices using this registry key can properly communicate with the Dell Server.

  • To suppress all Toaster notifications from the Encryption Management Agent, the following registry value must be set on the client computer.

    [HKEY_LOCAL_MACHINE\SOFTWARE\Dell\Dell Data Protection]

    "PbaToastersAllowClose" =DWORD:1

    0=Enabled (default)

    1=Disabled

  • To allow installation of Full Disk Encryption with Policy Based Encryption, the following registry value must be set on the client computer.

    [HKEY_LOCAL_MACHINE\SOFTWARE\Dell\Dell Data Protection]

    " EnableFDE" = DWORD: 1

    0=Disabled (default)

    1=Enabled


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\